@incollection{, 6A11CF8485822EEDEC1DCEC342270778 , author={{Kethan HarishYekula} and {Dr.Y.Venkateswarlu} and {Suneel KumarBadugu} and {Jawaharlala Nehru Technological University Kakinada(JNTUK)}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1342328 } @incollection{b0, , title={{Ensuring Distributed Accountability for Data Sharing in the Cloud Author}} , author={{ SmithaSundareswaran } and { AnnaCSquicciarini } and { IeeeMember } and { DanLin }} , journal={{IEEE Transactions on Dependable and Secure Computing}} 9 4 , year={July/August 2012} } @incollection{b1, , title={{Distributed Timestamp Generation in Planar Lattice Networks}} , author={{ PAmmann } and { SJajodia }} , journal={{ACM Trans. Computer Systems}} 11 , year={Aug. 1993} } @incollection{b2, , title={{Ensuring Distributed Accountability for Data Sharing in the Cloud}} , author={{ AnnaCSundareswaran } and { Squicciarini } and { IeeeMember } and { DanLin }} , booktitle={{Proc IEEE transactions on dependable and secure computing}} IEEE transactions on dependable and secure computing , year={2012} 9 } @incollection{b3, , title={{Oblivious Hashing: A Stealthy Software Integrity Verification Primitive}} , author={{ YChen }} , booktitle={{Proc. Int'l Workshop Information Hiding, F. Petitcolas}} Int'l Workshop Information Hiding, F. Petitcolas , year={2003} } @incollection{b4, , title={{Decentralized Trust Management and Accountability in Federated Systems}} , author={{ BChun } and { ACBavier }} , booktitle={{Proc. Ann. Hawaii Int'l Conf. System Sciences (HICSS)}} Ann. Hawaii Int'l Conf. System Sciences (HICSS) , year={2004} } @incollection{b5, , title={{Provable Data Possession at Untrusted Stores}} , author={{ GAteniese } and { RBurns } and { RCurtmola } and { JHerring } and { LKissner } and { ZPeterson } and { DSong }} , journal={{Proc. ACM Conf. Computer and Comm. Security}} , year={2007} } @book{b6, , title={{Security Assertion Markup Language (saml) 2.0}} , year={2012} OASIS Security Services Technical Committee } @incollection{b7, , title={{A Logic for Auditing Accountability in Decentralized Systems}} , author={{ RCorin } and { SEtalle } and { JIHartog } and { GLenzini } and { IStaicu }} , booktitle={{Proc. IFIP TC1 WG1}} IFIP TC1 WG1 } @book{b8, , title={{Workshop Formal Aspects in Security and Trust}} , year={2005} } @incollection{b9, , title={{Reasoning about Accountability within Delegation}} , author={{ BCrispo } and { GRuffo }} , booktitle={{Proc. Third Int'l Conf. Information and Comm. Security (ICICS)}} Third Int'l Conf. Information and Comm. Security (ICICS) , year={2001} } @incollection{b10, , title={{Location Systems for UbiquitousComputing}} , author={{ JHightower } and { GBorriello }} , journal={{Computer}} 34 8 , year={Aug. 2001} } @incollection{b11, , title={{Integrating Usage Control with SIP-BasedCommunications}} , author={{ EBarka } and { ALakas }} , journal={{J. Computer Systems, Networks, and Comm}} , year={2008. 2008} } @incollection{b12, , title={{Towards a Theory of Accountability and Audit}} , author={{ RJagadeesan } and { AJeffrey } and { CPitcher } and { JRiely }} , booktitle={{Proc. 14th European Conf. Research in Computer Security (ESORICS)}} 14th European Conf. Research in Computer Security (ESORICS) , year={2009} } @incollection{b13, , title={{Accountability as a WayForward for Privacy Protection in the Cloud}} , author={{ SPearson } and { ACharlesworth }} , booktitle={{Proc. First Int'l Conf. Cloud Computing}} First Int'l Conf. Cloud Computing , year={2009} } @incollection{b14, , title={{Method for Authenticating a Java Archive (jar) for Portable Devices}} , author={{ JHLin } and { RLGeiger } and { RRSmith } and { AWChan } and { SWanchoo }} , journal={{US Patent}} 6 353 , year={July 2004} } @incollection{b15, , title={{A Privacy Manager forCloud Computing}} , author={{ SPearson } and { YShen } and { MMowbray }} , booktitle={{Proc. Int'l Conf. Cloud Computing (CloudCom)}} Int'l Conf. Cloud Computing (CloudCom) , year={2009} NTP: The Network Time Protocol } @incollection{b16, , title={{Using Self-Defending Objects to Develop Security Aware Applications in Java}} , author={{ JWHolford } and { WJCaelli } and { AWRhodes }} , booktitle={{Proc. 27th Australasian Conf. Computer Science}} 27th Australasian Conf. Computer Science , year={2004} 26 } @incollection{b17, , title={{Accountability in Electronic Commerce Protocols}} , author={{ RKailar }} , journal={{IEEE Trans. Software Eng}} 22 5 , year={May 1996} } @incollection{b18, , title={{Identity-Based Encryption from theWeil Pairing}} , author={{ DBoneh } and { MKFranklin }} , booktitle={{Proc. Int'l Cryptology Conf. Advances in Cryptology}} Int'l Cryptology Conf. Advances in Cryptology , year={2001} } @incollection{b19, , title={{Towards AccountableManagement of Identity and Privacy: Sticky Policies and Enforceable 21. Tracing Services}} , author={{ TMather } and { SKumaraswamy } and { SLatif ; Mont } and { SPearson } and { PBramhall }} , booktitle={{Proc. Int'l WorkshopDatabase and Expert Systems Applications (DEXA)}} Int'l WorkshopDatabase and Expert Systems Applications (DEXA) , year={2003} , note={Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)} }